Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
9 views34 pages

Final Report.3docx

The document presents a mini project report on the 'Prison Management System' developed by students of PES College of Engineering, Mandya, as part of their Bachelor of Engineering degree requirements. The project aims to digitize and streamline the management of prisoner records, addressing inefficiencies in the existing manual systems by incorporating features like registration, login, and visitation logs. The system was designed using HTML, CSS, PHP, and Microsoft SQL, enhancing the overall efficiency of prison management by providing a comprehensive digital solution.

Uploaded by

Bhavana R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views34 pages

Final Report.3docx

The document presents a mini project report on the 'Prison Management System' developed by students of PES College of Engineering, Mandya, as part of their Bachelor of Engineering degree requirements. The project aims to digitize and streamline the management of prisoner records, addressing inefficiencies in the existing manual systems by incorporating features like registration, login, and visitation logs. The system was designed using HTML, CSS, PHP, and Microsoft SQL, enhancing the overall efficiency of prison management by providing a comprehensive digital solution.

Uploaded by

Bhavana R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 34

P. E. S.

COLLEGE OF ENGINEERING, MANDYA - 517401


(An Autonomous Institution Affiliated to Visvesvaraya Technological

University, Belagavi)

MINI PROJECT REPORT ON


“PRISON MANAGEMENT SYSTEM”

Submitted in partial fulfilment of the requirement


for the award of the
BACHELOR OF ENGINEERING DEGREE
Submitted by:

BHAVANA K [4PS19IS011]
BHAVANA R [4PS19IS012]
CHAITRASHREE [4PS19IS014]

Under the guidance of:

M S RAKSHITHA
Assistant professor,
Dept. of IS&E,
PESCE, Mandya

DEPARTMENT OF INFORMATION SCIENCE & ENGINEERING


P. E. S. COLLEGE OF ENGINEERING, MANDYA _ 571401
(An Autonomous Institution Affiliated to VTU, Belagavi)
PES COLLEGE OF ENGINEERING, MANDYA - 571401
(An Autonomous Institution Affiliated to VTU, Belagavi)

DEPARTMENT OF INFORMATION SCIENCE &ENGINEERING

CERTIFICATE

This is to certify that, BHAVANA K[4PS19IS011], BHAVANA R[4PS19IS012],

CHAITRASHREE[4PS19IS014] have successfully completed the Third Year entitled

“PRISON MANAGEMENT SYSTEM” in partial fulfilment for the award of


degree of Bachelor of Engineering in Information Science and Engineering of P.E.S. College

of Engineering Mandya, VTU Belagavi during the year 2020-2021. It is certified that all

corrections indicated in internal assessment have been incorporated in the report deposited

in the library. The mini project work has been approved as it satisfies the academic

requirements in respect of mini project work prescribed for the degree in Bachelor of

Engineering.

Signature of the Guide Head of the Department


M S Rakshitha Dr. M l Anitha
Assistant Professor, Professor & Head,
Dept of ISE Dept. of IS&E

Details of Mini Project [P18ISL56] Viva Voce Examination


held
Examine
Sl. rs Da
No
Na Signature te
.
me
1

2
3
P E S COLLEGE OF ENGINEERING MANDYA
(An Autonomous Institute under VTU, Belagavi)

Department of Information Science and Engineering

DECLARATION

We students of 5th semester Bachelor of Engineering in Information Science and Engineering, PESCE

Mandya, hereby declare that the project work being presented in the entitled “PRISON

MANAGEMENT SYSTEM” is an authentic record of the work that has been

independently carried out by us and submitted in partial fulfilment of the requirements for the award

of degree in semester Bachelor of Engineering in Information Science, affiliated to Visvesvaraya

Technological University (VTU), Belagavi during the year 2020-2021.The work contained in the

report has not been submitted in part or full to any other university or institution or professional body for the

award of any degree or any fellowship.

Date: BHAVANA K (4PS19IS011)

Place: Mandya BHAVANA R (4PS19IS012)

CHAITRASHREE

(4PS19IS014)
ACKNOWLEDGEMENT
Our report acknowledges some guidance, some supervision and a lot of inspiration. It is now time to

acknowledge our obligation to all who have extended their co-operation all along with our study

tenure of project work.

We take this pleasure in thanking, our beloved Principal Dr. R M MAHALINGE GOWDA, PES

College of Engineering, Mandya, who has always been a great source of inspiration and has

encouraged us through.

We would like to convey our heart full thanks to our Head of the Department of Information

Science and Engineering, Dr. M L ANITHA, for being there in monitoring us through our

project work.

We wish to express our deep sense of gratitude to our project guide M S RAKSHITHA,

Assistant Professor, Department of Information Science & Engineering for her guidance and

useful suggestions throughout our project work and we are thankful for her time, effort and also

for her continued encouragement in preparing this report.

We thank one and all who have helped us directly or in-directly in completing our project work.

BHAVANA K [4PSI19IS011]

BHAVANA R [4PS19IS012]

CHAITRASHREE[4PS19IS014]
ABSTRACT

Prisoner’s management has long been a neglected area and has only recently been included in the

20-22vision document under the e-governance. Currently, prisoner’s records are maintained in a very

rudimentary way in the form of manual files and registers. This method of data management often

results in human error, delay to retrieve information etc. Thus, An Online Prison Management

System was designed and implemented to manage prisoner’s records

The purpose of this project is to present a detailed description of the Prison Management System.

The document will describe what the system will do, the constraints under which it must operate and

how the system will react to external stimuli. This system contains the modules like Registration,

Login, Adding Prisoner, Adding the Jailers, Adding a visitor and Displaying the visitation log

Basic html was utilized for visible web content, php for server programming, and a Microsoft SQL

database was used to store and manage the prisoner's records in this project. Dreamweaver CS5 html

editor, CSS3 for styling, php wamp5server, and Microsoft SQL are being used to complete this

project

. The project was completed successfully, and the final outcome is a single management system that

incorporates all of a prisoner's information into a single profile that can be easily accessed, enhancing

the overall efficiency of prison management.


Serial no. Contents Page No

1. Introduction

1.1 Problem
Definition
1.2 Objective of
project

2. System Analysis

10-12
2.1 Existing System
2.2 Proposed System
2.3 Functional Requirements
2.4 Software and Hardware
Requirements

3. System design and Architecture


12-14
4. Feasibility Report

14-17
4.1 Technical Feasibility
4.2 Operation Feasibility
4.3 Economic Feasibility

5. System Design 17-18


6. Snapshots 18-28
7. System Testing 28-29
Conclusions 29
Reference
1.INRODUCTION

Management of prisons has long been a neglected area which has recently been incorporated in

the e-governance program of Government. Currently a rudimentary process of storing all the

prisoner data in manual files and registers is in place.

The Prison Management System project will integrate all the prisoner data into single integrated

system which will in turn result all the information being present in a digital format.

This system is named as Prison management system. This system is made to keep records about the

prisoners and about the guards. Jailor can log in as a user and can add the details of prisoners like

name, age, address, crime, and punishment.

In order to cope up with the increasing number of prisoners being lodged, the Administration

required a re-engineering and rationalization of their key business processes and functions of

prisoners’ related information and their computerization in order to speed up the processing of

information need of courts and various other national agencies.

Jailors can also add the details about the different guards that are on duty. Jailor can change

attributes like time-shift duty hours of guards. Jailor can also write the First Information Report

and can save it.

This system has the-the capability to maintain an infinite number of records. It is very useful as

the written papers have a limited time period and can get lost but in the prison management

system, this is not possible as a backup file will be created automatically and also updated

automatically when any change is made in any record.

There is no option to delete a prisoner’s record because it may be required later by the

government to know any details about the person and can help in the tracking of the prisoner.
1.1 PROBLEM DEFINATION

Management of prison is still at a nascent stage and follows rudimentary processes. Most of the

prisons have a collection of manual files and registers to store prisoner/criminal records. This is a

very inefficient and cumbersome way of storing records which greatly impedes the flow of critical

information as well as makes looking up of information time consuming.

Also, different files and registers are required to store the information which is relevant to a single

prisoner. This hinders the profiling process of prisoners.

1.2 OBJECTIVES OF PROJECT

1. The objective of Prison Management system is to develop a web-based program using which prison

system can be easily managed.

2. It provides the facility of displaying the details of prisoners, jailers, prison employment, visitation

log.

3. It also provides the facility to insert and update the records

4. To ensure proper monitoring of the prisons by the top officials.

5. To ensure that the discipline and decorum of the jails is maintained by both the employees and the
prisoners.

6. To ensure that no impersonation of the prisoners happens by proper validation and


authentication of the prisoner’s identity.

7. To improve the productivity and efficiency of the prisons so as to facilitate the usage of the available
work force for sensitive work while leveraging technology to reduce the mundane workload of the
employees.

8. To ensure the availability of data in digital form for preservation, analysis and reporting.
2.SYSTEM ANALYSIS

2.1 EXISTING SYSTEM

The old system recorded the details of the prisoner and jailer. The prisoner’s arriving year, release year, the

charge, age and gender are recorded. The jailer’s name, age, gender, supervising ward are recorded. This

system has the capability to maintain an infinite number of records. It is very useful as the written papers

have a limited time period and can get lost but in the prison management system, this is not possible as a

backup file will be created automatically and also updated automatically when any change is made in any

record

2.2 PROPOSED SYSTEM

This system also records the visitation logs and prison industry. Admin enters the details of the visitor like the

name of the visitor, relationship with the prisoner, date and time of visit. Admin also adds the details of the

prisoner like the name of the prisoner, which part of the prison he is working , what work , day and time , and

the guard on duty for the prison employment table .There is no option to delete a prisoner’s record because it

may be required later by the government to know any details about the person and can help in the tracking of

the prisoner.
2.3 FUNCTIONAL REQUIREMENTS

MODULES OF PRISON MANAGEMENT SYSTEM

Registration:
Users’ data need to be registered in the prison management system so as to use the

system and add the prisoner’s details, the guard’s duty shift, etc. If the user is not registered in the

prison management system, he/she cannot do any task with it like adding prisoner, crime and

punishment details, etc.

Login:

After registration one can log in to the system as the operator of the system on the behalf

of the user. After this, he has the other user interfaces available for further actions

Adding Prisoner:

The second option that is given in this is one of the most important that is adding prisoners.

As soon as the court declares that the victim is found guilty and tells his or her punishment and in

which prison the victim must be kept, the prisoner will be sent to the same prison as told by the court

and all the details of the criminal like name, age, prisoner Id , crime and the punishment all can be

updated in the prison management system, Then later these details can be used further and there is no

option to delete the prisoner’s data so once the prisoner is added to the database, no one can delete

the data of the criminal and it will be helpful as papers can get lost or can be theft but, in this case,

information cannot be lost and there is no use of theft this data as no changes can be made in the

database. Prisoners’ data cannot be lost because the backup of the database is there and the backup

gets updated as soon as the changes are made into the database
Adding the Jailers:

The third important feature that is provided by this system is adding the details about the

jailer of the prison. Therefore, an option is provided to the user to add the jailers if any new jailer

gets transferred. The options that are asked during adding a jailer detail are name, age, gender, shift,

so that details of any jailer can be checked.

Adding a visitor:

The visitor is supposed to sign in before visiting the prisoner. Their details such as name,

relationship with the prisoner, visiting time, visiting date and the prisoner id are entered during the

time of their sign in. On adding a visitor to the log, the prisoner’s previous visitation record will be

displayed.

Displaying the visitation log:

The records of the people visiting the prisoners is maintained. The list of people visiting a

particular prisoner can be obtained upon entering the prisoner id


2.4 SOFTAWARE AND HARDWARE REQUIREMENTS

HARDWARE REQUIREMENTS:

● PROCESSOR: AMD Ryzen 7 4700U with Radeon Graphics

● 2.00GHz.RAM: Minimum 8GB RAM capacity.

● HARD DISK: 512GB SSD. 6

● Fast and high bandwidth internet connection.

SOFTWARE REQUIREMENTS:
OPERATING SYSTEM: WINDOWS 10 (or) WINDOWS

7. FRONTEND PLATFORM:

● HTML
● CSS

BACKEND PLATFORM:
● MICROSOFT SQL
● PHP (APACHE SERVER)

WEB BROWSERS: Google Chrome, Firefox.

3.SYSTEM DESIGN AND ARCHITECTURE

DESIGN
As discussed above, the website is made using MICROSOFTSQL, PHP and the frontend is

made using HTML AND CSS the details of these libraries are explained below.

MICROSOFT SQL

SQL Server Management Studio (SSMS) is an integrated environment for managing any SQL

infrastructure. Use SSMS to access, configure, manage, administer, and develop all components of

SQL Server, Azure SQL Database , Azure SQL Managed Instance, SQL Server on Azure VM, and

Azure Synapse Analytics. SSMS provides a single comprehensive utility that combines a broad
group of graphical tools with many rich script editors to provide access to SQL Server for

developers and database administrators of all skill levels. SQL infrastructure, from SQL Server to

Azure SQL Database. SSMS provides tools to configure, monitor, and administer instances of SQL

Server and databases. Use SSMS to deploy, monitor, and upgrade the data-tier components used by

your applications, and build queries and scripts. Use SSMS to query, design, and manage your

databases and data warehouses, wherever they are - on your local computer, or in the cloud.

PHP
PHP is a programming language. It can be embedded into HTML, which is the big draw for

anyone interested in web development. Where HTML can be long, with lots of commands, PHP

pages contain HTML with embedded code, making it much easier to manage. PHP stands for

Hypertext Pre-processor which, in itself is confusing. It’s not actually as complicated as it seems

though – if you have a basic understanding of HTML, PHP is going to be pretty easy to learn. It

allows you to collect, process and utilize data to create output – basically it allows you to interact

with all your pages.

HTML

HTML is an acronym which stands for Hyper Text Markup Language which is used for

creating web pages and web applications. Let's see what is meant by Hypertext Markup Language,

and Web page.

Hyper Text

Hypertext simply means “Text within Text”. A text has a link within it, it is a hypertext.

Whenever you click on a link which brings you to a new webpage, you have clicked on a hypertext.

Hypertext is a way to link two or more web pages (HTML documents) with each other.
Markup language

A markup language is a computer language that is used to apply layout and formatting

conventions to a text document. Markup language makes text more interactive and dynamic.8

It can turn text into images, tables, links, etc.

Web Page

A web page is a document which is commonly written in HTML and translated by a web

browser. A web page can be identified by entering an URL. A Web page can be of the static or

dynamic type. With the help of HTML only, we can create static web pages.

Hence, HTML is a markup language which is used for creating attractive web pages with the help

of styling, and which looks in a nice format on a web browser. An HTML document is made of

many HTML tags and each HTML tag contains different content.

CSS

CSS stands for Cascading Style Sheets. It is a style sheet language which is used to describe the

look and formatting of a document written in markup language. It provides an additional feature to

HTML. It is generally used with HTML to change the style of web pages and user interfaces. It can

also be used with any kind of XML documents including plain XML, Sanad XUL.

CSS is used along with HTML and JavaScript in most websites to create user interfaces for

web applications and user interfaces for many mobile applications.

4.FEASIBILITY REPORT

Preliminary investigation examines project feasibility, the likelihood the system will be useful to

the organization. The main objective of the feasibility study is to test the Technical, Operational and

Economical feasibility for adding new modules and debugging old running system. All system is

feasible if they are unlimited resources and infinite time. There are aspects in the feasibility study

portion of the preliminary investigation:


● Technical Feasibility

● Operation Feasibility

● Economic Feasibility

4.1Technical Feasibility

The technical issue usually raised during the feasibility stage of the investigation
includes the following:
● Does the necessary technology exist to do what is suggested?

● Do the proposed equipment’s have the technical capacity to hold the data required to use the
new system?
● Will the proposed system provide adequate response to inquiries, regardless of the
number or location of users?

● Can the system be upgraded if developed?

● Are there technical guarantees of accuracy, reliability, ease of access and


data security?

Earlier no system existed to cater to the needs of ‘Secure Infrastructure Implementation 10

System’. The current system developed is technically feasible. It is a web-based user interface.

Thus, it provides an easy access to the users. The database’s purpose is to create, establish and

maintain a workflow among various entities in order to facilitate all concerned users in their

various capacities or roles. Permission to the users would be granted based on the roles specified.

Therefore, it provides the technical guarantee of accuracy, reliability and security.

The software and hard requirements for the development of this project are not many and are

available as free as open source. The work for the project is done with the current equipment and

existing software technology. Necessary bandwidth exists for providing a fast feedback to the users

irrespective of the number of users using the system.


4.2Operational Feasibility
Proposed projects are beneficial only if they can be turned out into information system.

That will meet the organization’s operating requirements. Operational feasibility aspects of the

project are to be taken as an important part of the project implementation. Some of the important

issues raised are to test the operational feasibility of a project includes the following:

-
● Is there sufficient support for the management from the users?

● Will the system be used and work properly if it is being developed and implemented?

● Will there be any resistance from the user that will undermine the possible application benefits?

This system is targeted to be in accordance with the above-mentioned issues. Beforehand, the

management issues and user requirements have been taken into consideration. So, there is no

question of resistance from the users that can undermine the possible application benefits.

The well-planned design would ensure the optimal utilization of the computer resources and

would help in the improvement of performance status.

4.3Economic Feasibility

A system can be developed technically and that will be used if installed must still be a good investment

for the organization. In the economic feasibility, the development cost in creating 11 the system is evaluated

against the ultimate benefit derived from the new systems. Financial benefits must equal or exceed the costs.

The system is economically feasible. It does not require any addition hardware or software. Since the

interface for this system is developed using the existing resources and technologies.

There is nominal expenditure and economic feasibility for certain. The software, Site Explorer is designed

for management of web sites from a remote location.


5.SYSTEM DESIGN
5.1ER-DIAGRAM
● The relation upon the system is structure through a conceptual ER-Diagram, which not

only specifics the existential entities but also the standard relations through which the system

exists and the cardinalities that are necessary for the system state to continue.

● The entity Relationship Diagram (ERD) depicts the relationship between the data objects.

The ERD is the notation that is used to conduct the date modeling activity the attributes of each

data object noted is the ERD can be described resign a data object description.

● The set of primary components that are identified by the ERD are

● Data object

● Relationships

● Attributes

● Various types of indicators.

The primary purpose of the ERD is to represent data objects and their relationship
Fig 5.1 ER-Diagram for Prison management System

6 SNAPSHOT

7 PRISON TABLE
Table 6.1 Prison table of prison management system

CRIME TABLE
Table 6.2 Crime table of prison management system

JAILER TABLE
Table 6.3 Jailer table of prison management system

VISITATION LOG TABLE


Table 6.4 Visitation log table of prison management system

PRISON EMPLOYMENT TABLE


Table 6.5 Prison Employment table of prison management system
Website

Fig 6.6 Snapshot of website page of prison management system

ABOUT

Fig 6.7 Snapshot of about option in prison management system website


FEATURES

Fig 6.8 Snapshot of Features of prison management system website

INSERT PRISONER

Fig 6.8 Snapshot of Insert Prisoner option in prison management system website
PRISONER UPDATE

Fig 6.9 Snapshot of Prisoner Update option in prison management system website

JAILOR LOGIN

Fig 6.10 Snapshot of Jailor Login option in prison management system website
INSERT JAILOR

Fig 6.11 Snapshot of Insert Jailor option in prison management system website

VISITORS

Fig 6.12 Snapshot of Visitors option in prison management system website

VISITORS LOG

Fig 6.13 Snapshot of Visitors Log option in prison management system website
CONTACT

Fig 6.14 Snapshot of contact option in prison management system website

7.SYSTEM TESTING

As the part of system testing, we execute the program with the intent of finding errors and missing

operations and also a complete verification to determine whether the objectives are met and the user

requirements are satisfied. The ultimate aim is quality assurance. Tests are carried out and the results are

compared with the expected document. In the case of erroneous 23 results, debugging is done. Using

detailed testing strategies, a test plan is carried out on each module. The various tests performed are unit

testing, integration testing and user acceptance testing.

Unit Testing: The software units in the system is are modules and routines that are assembled and integrated

to perform a specific function. As a part of unit testing, we executed the program for individual modules
independently. This enables, to detect errors in coding and logic that are contained within each of the three

modules. This testing includes entering data that is filling forms and ascertaining if the value matches to the

type and entered into the database. The various controls are tested to ensure that each performs its action as

required.

Integration Testing: Data can be lost across any interface, one module can have an adverse effect on

another, sub functions when combined, may not produce the desired major functions. Integration testing is a

systematic testing to discover errors associated within the interface. The objective is to take unit tested

modules and build


a program structure. All the modules are combined and tested as a whole. Here the admin module, sec

module and student module options are integrated and tested. This testing provides the assurance that the

application is well integrated functional unit with smooth transition of data.

User Acceptance Testing: User acceptance of a system is the key factor for the success of any

system. The system under consideration is tested for user acceptance by constantly keep the records

of applicants and making changes to the details and password whenever required.

Test
SL.NO Expected Actual Remarks
case Explanation
Name output output
1. Acceptance Insertion of Prisoner ID, age, Prisoner ID, age, PASS
prisoner’s name, crime type, name, crime type,
details ward, release ward, release
year, work time, year, work time,
name, gender, name, gender,
charges, charges,
admission year, admission year,
Type of work, Type of work,
wages wages is accepted
Should accept successfully
2. Acceptance Insertion of Prisoner ID, age, Prisoner ID, age, FAIL
prisoner’s name, crime type, name, crime type,
details ward, release ward, release
year, work time, year, work time,
name, gender, name, gender,
charges, charges,
admission year, admission year,
Type of work, Type of work,
wages wages not
Not accepted accepted

3. Updation Updation of Prisoner ID, Prisoner ID, PASS


prisoner’s wages, Type of wages, Type of
details work, ward work, ward
Updated Updated
successfully Successfully
4. Acceptance Updation of Prisoner ID, Prisoner ID, FAIL
prisoner’s wages, Type of wages, Type of
details work, ward work, ward
Not accept not accepted
5. Authentication Prisoner ID Prisoner ID and Prisoner ID and PASS
and password password will be password is
confirmation accepted accepted
6. Authentication Prisoner ID Prisoner ID and Prisoner ID and FAIL
and password password should password is not
confirmation not match matched
7. Acceptance Adding jailors Jailor ID, age, Jailor ID, age, PASS
details Supervision, Supervision,
name, Gender name, Gender
accepted Accepted
successfully
8. Acceptance Adding jailors Jailor ID, age, Jailor ID, age, FAIL
details Supervision, Supervision,
name, Gender name, Gender
Not accepted Not accepted
9. Acceptance Visitors’ S Name, prisoner Name, prisoner PASS
details ID, time, relation, ID, time, relation,
date date is accepted
Should accept

10. Acceptance Visitor’s Name, prisoner Name, prisoner FAIL


details ID, time, relation, ID, time, relation,
date date Not accepted
Not accepted

11. Authentication Prisoner ID Prisoner ID and Prisoner ID and PASS


and password password will be password is
confirmation accepted accepted
for visitor log
12. Authentication Prisoner ID Prisoner ID and Prisoner ID and FAIL
and password password should password is not
confirmation not match matched
for visitor log

Conclusion & Further improvements of the project

Further improvements of the project


o The further improvements that can be done to this project is we can incorporate the
rotation of the shifts of the duty of the jailers.
o We can enhance the security of the login credentials of the jailers and the prisoners.

o The visitors can also be provided the facility to pre book the visiting slots to visit the prisoners

Conclusion
In the modern world, the use of computers and mobile phones is becoming rampant, more so,

recent development in the ICT industries has revolutionized and accomplished. As a result, the, prison

management system needs to embrace new technologies. This report has presented a simple,

convenient, cost-friendly, sensitive and intelligible web interface. Whereby it can be accessed at any

time provided there is internet connection.

This system is named as Prison management system. This system is made to keep records about the

prisoners and about the guards. Jailor can log in as a user and can add the details of prisoners like

name, age, address, crime, and punishment. We have used many modules like Registration, Login,

Adding prisoner, Adding the jailers, Adding visitors and Displaying the visitation log.

Jailors can also add the details about the different guards that are on duty. Jailor can change

attributes like time-shift duty hours of guards. Jailor can also write the First Information Report
and can save it.

This system has the-the capability to maintain an infinite number of records. It is very useful as

the written papers have a limited time period and can get lost but in the prison management

system, this is not possible as a backup file will be created automatically and also updated

automatically when any change is made in any record.

There is no option to delete a prisoner’s record because it may be required later by the

government to know any details about the person and can help in the tracking of the prisoner.

So, the outcome of all the-the hard work did for the prison management system is here. It is

software that helps the user to work with the prisons easily. This software reduces the amount of

manual data entry and gives greater efficiency. The User Interface of it is very friendly and can

be easily used by anyone.

It also decreases the amount of time taken to write FIR details and other modules. In the end, we

can say that this software is performing all the tasks accurately and is doing the work for which

it is made.

REFERENCE

● Government department analysis of e-governance application,


http://www.mit.gov.in/sites/upload_files/dit/files/State%20-%20karnatakapdf

● . The Database Management Systems: Raghu Ramakrishnan, Johannes Gehrke, Mc Graw Hill
Education, 3rd Edition

● Taken reference from journals by:


Gollnick, D. & Chinn, P. (1990). Multicultural education in a pluralistic society (3rd ed.). New
York: MacMillan.
Hoffman, M (1987). Empathy and its development. New York: Cambridge University Press.
Jordan, J. (1991). Women’s growth in connection: Writings from the Stone Center. New York:
Guilford.
Jurik, N. (2006). Individual and organizational determinants of correctional officer attitudes
toward inmates. Criminology, 23(3), 523-539

https://www.researchgate.net/publication/282438197_Exemplary_prisoner_management

● . Referred the below pinned you tube videos for Php and Microsoft.
https://youtu.be/6oSWzvJMbBQ
https://youtu.be/OK_JCtrrv-c

You might also like